Resubmissions

13-02-2022 03:26

220213-dy59eafben 10

25-06-2021 19:08

210625-fml1gypkn6 8

19-06-2021 15:14

210619-d3391n953n 10

Analysis

  • max time kernel
    300s
  • max time network
    303s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    19-06-2021 15:14

General

  • Target

    Tray.exe

  • Size

    321KB

  • MD5

    6585cb51ff21007fb9ef936e96c58982

  • SHA1

    7a3d5563460b9935fe84879ee14fabfc7c664825

  • SHA256

    e07b0cd7eca5bc70b07ea786c3ef4da28036c901effa2193a93caf945cb2b334

  • SHA512

    523c7b3ed0907a473eac04c8cb8642eeea1d3a223069f876a7e0bc18075d59f9903319f6b2e3c2fa262158f04c4ad3637568dd9b0558732c8a574ffe566efc7d

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Drops file in Drivers directory 6 IoCs
  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 64 IoCs
  • Drops autorun.inf file 1 TTPs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Tray.exe
    "C:\Users\Admin\AppData\Local\Temp\Tray.exe"
    1⤵
    • Drops file in Drivers directory
    • Modifies extensions of user files
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:4092
  • C:\Windows\SysWOW64\werfault.exe
    werfault.exe /h /shared Global\b788965c6bb147ed9dc35498be823c95 /t 4012 /p 4092
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4788

Network

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Credential Access

Credentials in Files

1
T1081

Lateral Movement

Replication Through Removable Media

1
T1091

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\AppCompat\Programs\Amcache.hve
    MD5

    37af1953ea9a82402d3ff623854853db

    SHA1

    310ea59632ce3b789761567d6e82d6bc6cbd98f1

    SHA256

    af0fda2e1451761b9002530446eed5bae76c7809023477798a853ac8602450a3

    SHA512

    291f844118c6b73b3b055dc066c6a616bf64ab1f1ba33c806266795a40a6eed093f7c358728ecb113a94ef2f37ebb93afd5c486891c5d63ac7679a0616abf822

  • memory/4092-114-0x0000000000690000-0x0000000000691000-memory.dmp
    Filesize

    4KB

  • memory/4092-116-0x00000000053B0000-0x00000000053B1000-memory.dmp
    Filesize

    4KB

  • memory/4092-117-0x0000000004F50000-0x0000000004F51000-memory.dmp
    Filesize

    4KB

  • memory/4092-118-0x0000000004F20000-0x0000000004F21000-memory.dmp
    Filesize

    4KB

  • memory/4092-119-0x0000000004EB0000-0x00000000053AE000-memory.dmp
    Filesize

    5.0MB